Pioneer1
Untrusted computing platform can tamper with code execution in at least three ways:
Pioneer: challenge-response protocole between trusted & untrusted platform.
Assuarance that:
If you could revise
the fundmental principles of
computer system design
to improve security...
... what would you change?